IAMinZoho / OFFSEC-PowerShellLinks
My Favorite Offensive Security Scripts
☆73Updated 6 months ago
Alternatives and similar repositories for OFFSEC-PowerShell
Users that are interested in OFFSEC-PowerShell are comparing it to the libraries listed below
Sorting:
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆137Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- linikatz is a tool to attack AD on UNIX☆147Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆152Updated last year
- ☆95Updated 8 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- ☆105Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 3 months ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated last year
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆177Updated 5 months ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆193Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆99Updated 2 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 4 months ago
- ☆52Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆164Updated 2 years ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Everything and anything related to password spraying☆148Updated last year
- ☆85Updated last year
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆163Updated 4 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- a map for the azure oriented pentests☆67Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆116Updated 9 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆105Updated 2 years ago
- ☆38Updated 4 years ago
- ☆99Updated 3 years ago
- ☆97Updated last month